To see the other types of publications on this topic, follow the link: Hole interception.

Journal articles on the topic 'Hole interception'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 24 journal articles for your research on the topic 'Hole interception.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kendra, Paul E., Wayne S. Montgomery, Teresa I. Narvaez, and Daniel Carrillo. "Comparison of Trap Designs for Detection of Euwallacea nr. fornicatus and Other Scolytinae (Coleoptera: Curculionidae) That Vector Fungal Pathogens of Avocado Trees in Florida." Journal of Economic Entomology 113, no. 2 (November 19, 2019): 980–87. http://dx.doi.org/10.1093/jee/toz311.

Full text
Abstract:
Abstract Laurel wilt and Fusarium dieback are vascular diseases caused by fungal symbionts of invasive ambrosia beetles (Coleoptera: Curculionidae: Scolytinae). Both diseases threaten avocado trees in Florida. Redbay ambrosia beetle, Xyleborus glabratus, is the primary vector of the laurel wilt pathogen, Raffaelea lauricola, but in recent years this symbiont has been transferred laterally to at least nine other species of ambrosia beetle, which now comprise a community of secondary vectors. Dieback disease, caused by Fusarium spp. fungi, is spread by shot hole borers in the Euwallacea fornicatus species complex. In this study, we conducted field tests in Florida avocado groves to compare efficacy of four trap designs for detection of Scolytinae. Treatments included an 8-funnel Lindgren trap, black 3-vane flight interception trap, green 3-vane interception trap, white sticky panel trap, and an unbaited sticky panel (control). In two tests targeting E. nr. fornicatus and X. glabratus, traps were baited with a two-component lure (α-copaene and quercivorol). In a test targeting other species, traps were baited with a low-release ethanol lure. For E. nr. fornicatus, sticky panels and black interception traps captured significantly more beetles than Lindgren traps; captures with green traps were intermediate. With ethanol-baited traps, 20 species of bark/ambrosia beetle were detected. Trap efficacy varied by species, but in general, sticky traps captured the highest number of beetles. Results indicate that sticky panel traps are more effective for monitoring ambrosia beetles than Lindgren funnel traps, the current standard, and may provide an economical alternative for pest detection in avocado groves.
APA, Harvard, Vancouver, ISO, and other styles
2

Wentasari, Risa, and Adriyade Reshi Gusta. "Karakteristik Iklim Mikro Serta Pertumbuhan Pada Beberapa Sistem Tanam Jagung Dengan Pola Tanam Tumpang Sari Dan Tanam Tunggal." Jurnal Penelitian Pertanian Terapan 18, no. 3 (January 10, 2020): 199. http://dx.doi.org/10.25181/jppt.v18i3.1507.

Full text
Abstract:
The purpose of this study is to know the characteristics of microclimate and the growth ofcorn and soybean on single row, doble row, twin row, and twin row seed system inpoliculture and monoculture pattern. The research was arranged in Randomized BlockDesign with two factors (1) planting system consisting of 4 treatments (Sigle Row (SR) (25x75cm) Doble Row (DR) (20x 20x 80cm), Twin Row (TR) (20x10x 80 cm), and Twin Seed (TS)(40 x 75cm (2 seed in 1 planting hole)) and (2) Cropping Pattern (Polikulture (TS) (100 cmof corn line distance)) and monokulture (TT), with 3 replications. Data analysis was doneby F test (1% and 5%) and BNT (5%). Conclusions: Microclimatic characteristics (a) LightInterception (%) at morning of middle plant canopy, midday and afternoon in the middle andlower part of the canopy are not significantly different. There is a significant difference inmorning light interception at the bottom of the plant canopy, the lowest light interception isTTSR treatment. Temperature (oC) there was significant difference of temperature due to treatment. the TTTS treatment had the highest average temperature under the plant canopy(26.30 o C) and the center of the plant canopy (29.40 o C). Relative humidity (%) did not give a significantly different response to the treatment.
APA, Harvard, Vancouver, ISO, and other styles
3

Collins, D. W., J. Robinson, E. G. Hancock, L. M. Maddison, and J. Stephens. "Thysanoptera caught by emergence trapping from oak trees at Hamilton High Parks, South Lanarkshire, including Hoplothrips semicaecus (Uzel) new to Scotland." Glasgow Naturalist 27, no. 2 (2020): 9–14. http://dx.doi.org/10.37208/tgn27205.

Full text
Abstract:
A survey of the saproxylic invertebrate fauna of the Cadzow oaks parkland, South Lanarkshire, Scotland, part of the Hamilton High Parks Site of Special Scientific Interest, was undertaken between April 2017 and April 2018, with additional prior test trapping having started in August 2016. Several different search methodologies were utilised, including Owen emergence traps, flight interception traps, hollow tree traps, and rot hole traps. Large numbers of a non-target group of insects - thrips (Order Thysanoptera) - were noted in some of the traps from the first batch to be examined and separated out for analysis. A total of 370 individuals from eight species was identified, with 85.1% of these thrips being collected by three Owen emergence traps, a novel methodology for determining the presence, or abundance, of dispersing Thysanoptera. The majority (92.4%) of the thrips represented two fungal-feeding phlaeothripid species, Hoplothrips pedicularius and H. semicaecus. This is the first report of H. semicaecus from Scotland.
APA, Harvard, Vancouver, ISO, and other styles
4

Chittibabu, Y., CH Anuradha, and Sri Rama Chandra P. Murty. "Fuzzy Trust Based Energy Aware Multipath Secure Data Collection in Wireless Sensor Network." Journal of Computational and Theoretical Nanoscience 16, no. 2 (February 1, 2019): 669–75. http://dx.doi.org/10.1166/jctn.2019.7788.

Full text
Abstract:
Wireless Sensor Network (WSN) is the most promising inventions that can find its application in diverse fields such as army surveillance and forest fire detection. Multi-hop routing is followed in WSN, and the greatest security with effect to identity deception is produced through replaying routing information. An inevitable role is played by trust in the sensor network in case of military and other applications. Serious research work is being conducted on secured data aggregation. Longestablished cryptographic trust-aware routing protocols which are being used currently have become outdated, and their proficiency in tackling the situation is not much satisfactory. This ultimately results in increased complexity, poor link quality and high overhead when it comes to a number of cryptographic methods. This work deals with fuzzy logic based trust evaluation technique that can acquire secured routing. Direct Random Propagation (DRP) protocol and fuzzy logic are used in calculating the trust of the nodes. Flooding attack and black hole are proposed, and it eliminates the attack. The threshold value is compared with trust value. The ultimate result shows that the method that is proposed provides lesser interception probability, packet loss and end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Shasha, Tao Deng, Yang Zhang, Yuning Li, Weijie Yin, Qi Chen, and Zewen Liu. "Solar-blind ultraviolet detection based on TiO2 nanoparticles decorated graphene field-effect transistors." Nanophotonics 8, no. 5 (April 26, 2019): 899–908. http://dx.doi.org/10.1515/nanoph-2019-0060.

Full text
Abstract:
AbstractSensitive solar-blind ultraviolet (UV) photodetectors are important to various military and civilian applications, such as flame sensors, missile interception, biological analysis, and UV radiation monitoring below the ozone hole. In this paper, a solar-blind UV photodetector based on a buried-gate graphene field-effect transistor (GFET) decorated with titanium dioxide (TiO2) nanoparticles (NPs) was demonstrated. Under the illumination of a 325-nm laser (spot size ~2 μm) with a total power of 0.35 μW, a photoresponsivity as high as 118.3 A/W was obtained, at the conditions of zero gate bias and a source-drain bias voltage of 0.2 V. This photoresponsivity is over 600 times higher than that of a recently reported solar-blind UV photodetector based on graphene/vertical Ga2O3 nanowire array heterojunction (0.185 A/W). Experiments showed that the photoresponsivity of the TiO2 NPs decorated GFET photodetectors can be further enhanced by increasing the source-drain bias voltage or properly tuning the gate bias voltage. Furthermore, the photoresponse time of the TiO2 NPs decorated GFET photodetectors can also be tuned by the source-drain bias and gate bias. This study paves a simple and feasible way to fabricate highly sensitive, cost-efficient, and integrable solar-blind UV photodetectors.
APA, Harvard, Vancouver, ISO, and other styles
6

Mateos, B., and S. Schnabel. "Rainfall interception by Holm Oaks in Mediterranean open woodland." Cuadernos de Investigación Geográfica 27 (June 30, 2001): 27. http://dx.doi.org/10.18172/cig.1111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

NOREM, JAMES H., and JAMES E. SPENCER. "Pin–Hole Luminosity Monitor with Feedback." International Journal of Modern Physics A 20, no. 31 (December 20, 2005): 7379–91. http://dx.doi.org/10.1142/s0217751x05031198.

Full text
Abstract:
Previously, the generalized luminosity [Formula: see text] was defined and calculated for all incident channels based on an NLC e+e- design. Alternatives were then considered to improve the differing beam-beam effects in the e-e-, eγ and γγ channels. Regardless of the channel, there was a large flux of outgoing, high energy photons that were produced from the beam-beam interaction e.g. beamstrahlung that needs to be disposed of and whose flux depended on [Formula: see text]. One approach to this problem is to consider it a resource and attempt to take advantage of it by disposing of these straight–ahead photons in more useful ways than simply dumping them. While there are many options for monitoring the luminosity, any method that allows feedback and optimization in real time and in a non-intercepting and non-interfering way during normal data taking is extremely important – especially if it provides other capabilities such as high resolution tuning of spot sizes and can be used for all incident channels without essential modifications to their setup. Our "pin-hole" camera appears to be such a device if it can be made to work with high energy photons in ways that are compatible with the many other constraints and demands on space around the interaction region. The basis for using this method is that it has, in principle, the inherent resolution and bandwidth to monitor the very small spot sizes and their stabilities that are required for very high, integrated luminosity. While there are many possible, simultaneous uses of these outgoing photon beams, we limit our discussion to a single, blind, proof-of-principle experiment that was done on the FFTB line at SLAC to certify the concept of a camera obscura for high energy photons.
APA, Harvard, Vancouver, ISO, and other styles
8

Pitsoulis, Athanassios, and Soeren C. Schwuchow. "Coercion, Credibility, and Mid-Air Interceptions of Military Planes." Peace Economics, Peace Science and Public Policy 20, no. 4 (December 1, 2014): 697–707. http://dx.doi.org/10.1515/peps-2014-0040.

Full text
Abstract:
AbstractPointing out the remarkable levels of hostile interaction in the air space over contested territory between states like China and Japan or Greece and Turkey we argue that air space incursions can be interpreted as a rational strategy with ultimately political aims. In our interpretation deliberate intrusions of military aircraft into sensitive air space serve as an indirect risk-generating mechanism, as they will trigger scrambles of the opposed government’s air force which may escalate into a military crisis. We derive testable hypotheses from a game-theoretic model, which we developed in earlier work to explore the strategic logic behind this risk-generating mechanism more rigorously. In order to test whether the model’s predictions regarding the effect of short-term economic developments on the states’ interaction hold, we built a database of daily event observations from the Hellenic National Defence General Staff reports of the last 4 years, containing time series data of Turkish intrusions into Greek-claimed air space and the number of dogfights between Greek and Turkish fighter planes. What we find is that not only Greek engagements of Turkish intruders but also massed, provocative Turkish intrusions have become significantly less likely after the onset of the Greek economic crisis. These findings are well in line with the predictions of the model and thus supportive of our theory.
APA, Harvard, Vancouver, ISO, and other styles
9

Burhan, Ahmad S., and Fehmieh R. Nawaya. "Preventive and interceptive orthodontic needs among Syrian children." Journal of the Egyptian Public Health Association 91, no. 2 (June 2016): 90–94. http://dx.doi.org/10.1097/01.epx.0000483238.83501.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Robertson, MJ, and F. Giunta. "Responses of spring wheat exposed to pre-anthesis water stress." Australian Journal of Agricultural Research 45, no. 1 (1994): 19. http://dx.doi.org/10.1071/ar9940019.

Full text
Abstract:
Spring wheat cv. Yecora 70 was exposed to soil water deficits during three phases between emergence and anthesis: early (22 days after sowing to terminal spikelet), mid (terminal spikelet to anthesis) and late (early boot to anthesis). The objective was to quantify the effects of water stress on partitioning of above-ground biomass to the spike, the ratio between kernel number and anthesis spike weight, canopy expansion, radiation interception and phenology. This information can be used to test the assumptions used when modelling wheat growth and yield under water-limiting conditions. The extension rate of the lamina and pseudostem was reduced when more than 50% of the extractable soil water had been extracted from the root-zone, independent of the stage when stress was imposed. Stress reduced biomass accumulation more through a reduction of the amount of radiation intercepted than reduced radiation-use efficiency. The reduction in the amount of radiation intercepted was due to lower leaf area index, as the radiation extinction coefficient was similar under stress and non-stress conditions. Stress treatments reduced spike biomass at anthesis to 58-94% of that in the well-watered control, but had little effect on the pattern of biomass partitioning to the spike and the proportion of anthesis biomass as spike. Stress after terminal spikelet reduced the ratio of kernel number to anthesis spike weight by 50%, suggesting that reduced kernel number under stress may not be solely due to a restricted assimilate supply. This study showed that current assumptions are valid regarding the response of wheat to pre-anthesis stress in terms of canopy expansion, radiation interception and biomass partitioning to the spike. However, the constancy of the ratio of kernel number to anthesis spike weight was shown not to hold under water stress.
APA, Harvard, Vancouver, ISO, and other styles
11

Zago, Myrka, Gianfranco Bosco, Vincenzo Maffei, Marco Iosa, Yuri P. Ivanenko, and Francesco Lacquaniti. "Fast Adaptation of the Internal Model of Gravity for Manual Interceptions: Evidence for Event-Dependent Learning." Journal of Neurophysiology 93, no. 2 (February 2005): 1055–68. http://dx.doi.org/10.1152/jn.00833.2004.

Full text
Abstract:
We studied how subjects learn to deal with two conflicting sensory environments as a function of the probability of each environment and the temporal distance between repeated events. Subjects were asked to intercept a visual target moving downward on a screen with randomized laws of motion. We compared five protocols that differed in the probability of constant speed (0 g) targets and accelerated (1 g) targets. Probability ranged from 9 to 100%, and the time interval between consecutive repetitions of the same target ranged from about 1 to 20 min. We found that subjects systematically timed their responses consistent with the assumption of gravity effects, for both 1 and 0 g trials. With training, subjects rapidly adapted to 0 g targets by shifting the time of motor activation. Surprisingly, the adaptation rate was independent of both the probability of 0 g targets and their temporal distance. Very few 0 g trials sporadically interspersed as catch trials during immersive practice with 1 g trials were sufficient for learning and consolidation in long-term memory, as verified by retesting after 24 h. We argue that the memory store for adapted states of the internal gravity model is triggered by individual events and can be sustained for prolonged periods of time separating sporadic repetitions. This form of event-related learning could depend on multiple-stage memory, with exponential rise and decay in the initial stages followed by a sample-and-hold module.
APA, Harvard, Vancouver, ISO, and other styles
12

Fantozzi, Federica, Fabrizio Monaci, Tijana Blanusa, and Roberto Bargagli. "Holm Oak (Quercus ilex L.) canopy as interceptor of airborne trace elements and their accumulation in the litter and topsoil." Environmental Pollution 183 (December 2013): 89–95. http://dx.doi.org/10.1016/j.envpol.2012.11.037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

RIGHI, CIRO ABBUD, VINCENT COUDERC, CARLOS RODRIGUES PEREIRA, and HILTON THADEU ZARATE COUTO. "RESPONSES OF EUCALYPTUS CAMALDULENSIS SPROUTS TO SHADE: AN EVALUATION OF CANOPY PLASTICITY." Experimental Agriculture 52, no. 3 (June 16, 2015): 346–58. http://dx.doi.org/10.1017/s0014479715000137.

Full text
Abstract:
SUMMARYEucalyptus spp. is the main tree used in cellulose production worldwide, cultivated mostly in extensive monocrop plantations. However, due to concerns on environmental impacts, fear on decrease of food production related to the size of cultivated area, its location near human settlements with few jobs generation, eucalypt cultivation is no longer encouraged in many places. At the same time, large plantations hold the opportunity to integrate eucalypt into agroforestry systems (AFS) in a variety of production systems with many social, economical and environmental advantages. In this study we studied canopy modifications of E. camaldulensis sprouts under different degrees of shade. The plants were located on a gradient of available solar irradiation ranging from 51 to 94%. E. camaldulensis showed canopy plasticity with modified radiation interception patterns under diverse irradiations. Most of these variations were of small amplitude with some important variables remaining almost unchanged (leaf density, canopy percentage, tree, trunk and canopy height) or increasing only slightly (leaf area index and canopy opening). The main changes presented by E. camaldulensis, with a steep increase towards full sun, were: foliage area, canopy surface, canopy volume and area of canopy projection. In order to design appropriate agroforestry systems with young eucalypt growing under the shade of other crops, it is necessary to determine at which point the observed variable changes can support reasonable production.
APA, Harvard, Vancouver, ISO, and other styles
14

Mazzanti, Michele, Stefano Caramori, Marco Fogagnolo, Vito Cristino, and Alessandra Molinari. "Turning Waste into Useful Products by Photocatalysis with Nanocrystalline TiO2 Thin Films: Reductive Cleavage of Azo Bond in the Presence of Aqueous Formate." Nanomaterials 10, no. 11 (October 28, 2020): 2147. http://dx.doi.org/10.3390/nano10112147.

Full text
Abstract:
UV-photoexcitation of TiO2 in contact with aqueous solutions of azo dyes does not imply only its photocatalytic degradation, but the reaction fate of the dye depends on the experimental conditions. In fact, we demonstrate that the presence of sodium formate is the switch from a degradative pathway of the dye to its transformation into useful products. Laser flash photolysis experiments show that charge separation is extremely long lived in nanostructured TiO2 thin films, making them suitable to drive both oxidation and reduction reactions. ESR spin trapping and photoluminescence experiments demonstrate that formate anions are very efficient in intercepting holes, thereby inhibiting OH radicals formation. Under these conditions, electrons promoted in the conduction band of TiO2 and protons deriving from the oxidation of formate on photogenerated holes lead to the reductive cleavage of N=N bonds with formation and accumulation of reduced intermediates. Negative ion ESI–MS findings provide clear support to point out this new mechanism. This study provides a facile solution for realizing together wastewater purification and photocatalytic conversion of a waste (discharged dye) into useful products (such as sulfanilic acid used again for synthesis of new azo dyes). Moreover, the use of TiO2 deposited on an FTO (Fluorine Tin Oxide) glass circumvents all the difficulties related to the use of slurries. The obtained photocatalyst is easy to handle and to recover and shows an excellent stability allowing complete recyclability.
APA, Harvard, Vancouver, ISO, and other styles
15

Blanco, Carlos A., Armando Rosario-Lebron, Cheryle A. O’Donnell, Maribel Portilla, Connor Gullbronson, Joseph Mowery, Allan H. Smith-Pardo, et al. "Improving Risk Assessment of Noctuid Pests at North American Ports and Farms by Differentiating Egg Morphology." Annals of the Entomological Society of America 112, no. 5 (June 26, 2019): 443–50. http://dx.doi.org/10.1093/aesa/saz029.

Full text
Abstract:
Abstract Heliothine eggs are commonly found on agricultural commodities and ornamental plants transported through domestic and international commerce. Tobacco budworm [Chloridea (Heliothis) virescens (F.)], Chloridea subflexa (Guenée), and the corn earworm [Helicoverpa zea (Boddie)] are indigenous pests of the American continent. Interceptions of the Old World bollworm [Helicoverpa armigera (Hübner)] at various ports of entry into the United States have been detected due to the invasion of this pest in South America, adding to the complexity and importance of decision making at plant inspection stations. The ability to distinguish the eggs of C. virescens from C. subflexa and Helicoverpa species is a critical component for conducting risk assessments by quarantine authorities, taxonomists, and crop consultants. We developed a simple, rapid (~60 min), inexpensive ($0.06 per sample), and accurate (100% reliability) technique to distinguish C. virescens eggs from the possibility of being H. armigera based on the presence, number, and/or size of aeropyle holes on the primary ribs of eggs, near the micropylar rosette. In this location, aeropyles were easily visible at 40× magnification in 213 fresh and ethanol-preserved C. virescens eggs once treated with Hoyer’s solution. A small number of C. subflexa had one or two aeropyles on a few of the primary ribs, whereas no aeropyles were found on 411 H. zea and 269 H. armigera eggs analyzed using optical, electron, and confocal microscopy. We conclude that in most cases multiple aeropyle holes positively identify H. virescens eggs from H. zea or H. armigera, and C. subflexa. This technique potentially will reduce the number of specimens that need to be sent for molecular identification thereby saving program time and resources.
APA, Harvard, Vancouver, ISO, and other styles
16

Mafia, Reginaldo Gonçalves, Acelino Couto Alfenas, Leandro de Siqueira, Eraclides Maria Ferreira, Hélio Garcia Leite, and José Renato P. Cavallazzi. "Critério técnico para determinação da idade ótima de mudas de eucalipto para plantio." Revista Árvore 29, no. 6 (December 2005): 947–53. http://dx.doi.org/10.1590/s0100-67622005000600014.

Full text
Abstract:
Atualmente, a produção de mudas de Eucalyptus, em larga escala, é realizada pela miniestaquia, sob condições controladas. Todavia, ainda hoje não existe um critério técnico para determinar a idade ótima das mudas para plantio, o que pode refletir negativamente sobre a qualidade, sobretudo do sistema radicular, e, conseqüentemente, grandes perdas podem ocorrer no campo. Assim, o presente trabalho estabeleceu um critério técnico com base nas curvas de velocidade de crescimento e no intercepto entre as curvas de incremento corrente diário e incremento médio diário das variáveis altura, biomassa radicular e da parte aérea. Em virtude da restrição de volume explorável pelo sistema radicular, constataram-se reduções significativas na velocidade de crescimento das mudas que devem ser plantadas, preferencialmente, com 80 (clone A) a 100 (clone B) dias de idade, uma vez que mudas mais velhas sofrem redução na velocidade de crescimento e tendem a desenvolver problemas de malformação radicular. As implicações da baixa qualidade do sistema radicular residem na mortalidade de plantas, principalmente em períodos menos favoráveis, e na conseqüente influência na operação de replantio, bem como na realização dos testes clonais e na maior suscetibilidade das plantas aos estresses do ambiente.
APA, Harvard, Vancouver, ISO, and other styles
17

Zinzombe, Shamiso. "Harnessing the Human Rights Reasonableness Principle for Access to Medicine." Groningen Journal of International Law 3, no. 2 (December 18, 2015): 1. http://dx.doi.org/10.21827/5a86a8c6301bd.

Full text
Abstract:
The reasonableness principle has come to the fore in human rights law with the entry into force of a much anticipated Optional Protocol to the International Covenant on Economic, Social and Cultural Rights. While the Committee on Economic, Social and Cultural Rights, monitoring implementation of the treaty, has maintained a similar principle in documents such as its statements, this is the first time that the reasonableness principle has been formally enumerated in human rights treaty law. The manner in which pharmaceutical corporations exploit patents in the context of the human right entitlement to access medicine is an interesting area to examine using this principle. The application of patents to medicine is controversial and rightly challenged for creating a system of innovation that prioritises profits over people. This unconscionable system is one for which activists, scholars and commentators are correctly calling for a human rights based open system of innovation that ensures access to medicine for all in need. This article, however, explores strategies that could be used in the meantime. These strategies speak to some causes of this problem related to decisions to use intellectual property in certain contexts. For example, the seizure of generic medicine en route from India to Brazil whilst in transit in Rotterdam, the use of multiple patents through strategies known as 'evergreening', patent 'thicketing' or 'clustering' to thwart the entry of generic medicine, or restrictions on voluntary licences such as geographic restrictions that prevent supply of medicine to certain territories. At the same time, it is worthwhile noting that the Agreement on Trade-Related Aspects of Intellectual Property contains provisions which could work with the reasonableness principle. Thus, this article argues, in addition to other principles advanced in the human rights community in this area, it is also possible to apply a reasonableness principle to the use of intellectual property in the area of medicine. It does so by using seizure of in-transit generic medicine as a case study with which to extrapolate the potential application of the reasonableness principle. This paper sets out an introduction, explains the practice of intercepting or seizing generic medicine in-transit, discusses the reasonableness principle and explores the reasonableness principle as a mechanism to hold pharmaceutical corporations to account in order to promote, rather than hinder access to medicine.
APA, Harvard, Vancouver, ISO, and other styles
18

Pavlenko, O. V. "Катастрофа «русской марсельезы» 1917 г. и ее осмысление в современной историографии." Istoricheskii vestnik, no. 23(2018) part: 23/2018 (September 27, 2019): 12–37. http://dx.doi.org/10.35549/hr.2019.2018.36607.

Full text
Abstract:
istorical experience creates a particular system of codes and meanings in the culture of nations and societies. The memory of the past, with triumphs and defeats intertwined, is the basis of any form of collective identity. In some cases, the present and the past share a common historical guilt, in others, a great victory. It becomes a foundation for new moral imperatives, patriotic symbols, images of victims and heroes. For seventy years, the national historiography has been dominated by an apologetic concept of the Great October Revolution that had laid the foundation for the Soviet national identity. The historiographic canon, created in the thirties, underwent virtually no change. The gigantic historiography of the Great October has been developing within the traditional framework of the CPSU history espoused by several generations of historians. The unsuccessful February Revolution served as a simple background for the victorious October that brought down the tsarist regime and the dictatorship of the bourgeoisie. In the era of glasnost and archive revolution, there began a heated revision of the Soviet concept where emotions often won over scientific analysis. The changes of the last two decades made it possible to interpret the Revolution of 1917 as a multidimensional process of a drastic transformation of the entire Russian system, which, in its turn, changed the world order. Over the past few years, there has been a steep increase in the number of nonfictional historical publications containing archival materials, memoirs, and visual sources (posters, caricatures, etc.). The buildup of narrative material is so fastpaced that historians lag behind in interpreting and summarizing it. Factbased, fragmentary descriptions significantly prevail over the attempts to give it a conceptual interpretation, even though recent studies actively explore the mechanisms that trigger revolution, the nature of social protest and violence, the forms of legitimation of the new power, the cultural references of political radicalism, A particular attention is paid to the ethnocultural discourse of the revolutionary process. Despite a certain fragmentation of topics, The stages of political struggle gave way to one another as different forces attained power but found themselves unable to hold together this gigantic country that was falling apart. In this aspect, the dynamics of the revolutionary crisis in Russia was similar to the one of the French Revolution. It should be noted that the overall narrative of the revolutionary process and the vision of its development stages are defined not only by the center, but also by regions. The revolutionrelated research carried out by local historians is particularly impressive. Regional archives allow a recreation of a colorful, dramatic history of takeover/ interception/ transfer of power at the local level, full of clashes and conflicts. It is obvious though that the regional research requires further development and classification. At the same time, the level of scientific research does not allow to address the issue of the way in and out of the revolution. Many questions still remain unanswered after numerous conferences and publications in 2017. Which criteria are necessary to date the beginning and the end of the revolutionary process in Russia Can civil war be included in the overall revolutionary context, similar to the French Revolution The anatomy of any grandscale protest comprises of a sum of internal radical projects and strategies of external players with their own geopolitical interests. The Interests and Identities of all people, social and political groups, national and international elite that got involved in the process, voluntarily or involuntary, manifest themselves best of all in the cauldron of revolutionary ebullition. And for a researcher, the key motivation consists in distinguishing visible and seemingly invisible interactions of all these entities, comparing the external, eventrelated processes with the internal dynamics of power struggles. The topic of power and society analyzed against the background of the Revolution of 1917 includes the issues essential for understanding the quality of development of the Russian Empire in the early XXth century. In the papers by B. Mironov, V. Nikonov, N. Smirnov, the genesis of revolution is seen as a conflict of tradition and modernity. In 1905, Russia began its slow and painful progress from tsarist autocracy to parliamentary monarchy. this connection, modern historiography puts a particular emphasis on the analysis of civic engagement and the forms of selforganization of society. The Soviet vision of the tsarist regime as a suppressor of civil liberties, so actively used in modern Western papers, was revised. The Russian historiography is currently undergoing intense debates and methodological realignment, searching for new paradigms in the analysis of the revolutionary process. But most importantly, the historical continuity between the imperial, Soviet and postSoviet eras is being gradually restored in the papers covering the Revolution of 1917, and the idea of existence of a single revolutionary process from February to October 1917 is slowly taking shapeисторический опыт создает особую систему кодов и смыслов в культуре народов и обществ. Память о прошлом, где переплетаются триумфы и поражения, является основой любой формы коллективной идентичности. В одних случаях настоящее и прошлое объединяет общая историческая вина, в другихВеликая Победа. Она становится основой для новых нравственных императивов, патриотических символов, образов жертв и героев. На протяжении семидесяти лет в отечественной историографии доминировала апологетическая концепция Великой Октябрьской революции, заложившая основы советской национальной идентичности. Историографический канон, созданный в тридцатые годы, практически не претерпел изменений. Гигантская историография Великого Октября развивалась в традиционных рамках истории КПСС, поддерживаемой несколькими поколениями историков. Неудачная Февральская революция послужила простым фоном для победоносного октября, обрушившего царский режим и диктатуру буржуазии. В эпоху гласности и архивной революции начался бурный пересмотр советской концепции, где эмоции часто одерживали верх над научным анализом. Изменения последних двух десятилетий позволили интерпретировать революцию 1917 года как многомерный процесс кардинальной трансформации всей российской системы, которая, в свою очередь, изменила мировой порядок. За последние несколько лет резко возросло количество нехудожественных исторических изданий, содержащих архивные материалы, мемуары, визуальные источники (плакаты, карикатуры и др.). Накопление повествовательного материала происходит настолько быстро, что историки отстают в его интерпретации и обобщении. Фактологические, фрагментарные описания значительно превалируют над попытками дать ему концептуальную трактовку, хотя в последних исследованиях активно исследуются механизмы, запускающие революцию, характер социального протеста и насилия, формы легитимации новой власти, культурные отсылки политического радикализма, идеологические и социальные проблемы.В. Symbolic символическое перекодирование публичного пространства. Особое внимание уделено этнокультурному дискурсу революционного процесса. Несмотря на определенную фрагментарность тематики, российские историки разделяют идею непрерывности революционного процесса с февраля по октябрь 1917 года. Этапы политической борьбы сменялись друг другом по мере того, как различные силы приходили к власти, но оказывались неспособными удержать вместе эту гигантскую страну, которая разваливалась на части. В этом аспекте динамика революционного кризиса в России была схожа с динамикой Французской революции. Следует отметить, что общая нарративность революционного процесса и видение этапов его развития определяются не только центром, но и регионами. Особенно впечатляют исследования, связанные с революцией, проведенные местными историками. Региональные архивы позволяют воссоздать красочную, драматичную историю захвата / перехвата / передачи власти на местном уровне, полную столкновений и конфликтов. Однако очевидно, что региональные исследования требуют дальнейшего развития и классификации. В то же время уровень научных исследований не позволяет решить вопрос о входе и выходе революции. Многие вопросы до сих пор остаются без ответа после многочисленных конференций и публикаций в 2017 году. По каким критериям необходимо датировать начало и конец революционного процесса в России Может ли гражданская война быть включена в общий революционный контекст, подобный Французской революции Анатомия любого масштабного протеста складывается из суммы внутренних радикальных проектов и стратегий внешних игроков со своими геополитическими интересами. Интересы и идентичности всех людей, социальных и политических групп, национальной и международной элиты, которые вольно или невольно оказались вовлеченными в этот процесс, лучше всего проявляются в котле революционного кипения. А для исследователя ключевая мотивация состоит в различении видимых и, казалось бы, невидимых взаимодействий всех этих сущностей, сопоставлении внешних, событийных процессов с внутренней динамикой борьбы за власть. Тема власти и общества, анализируемая на фоне революции 1917 года, включает в себя вопросы, существенные для понимания качества развития Российской империи в начале ХХ века. В работах Б. Миронова, В. Никонова, Н.Смирнова Генезис революции рассматривается как конфликт традиции и современности. В 1905 году Россия начала свой медленный и болезненный путь от царского самодержавия к парламентской монархии. в этой связи современная историография уделяет особое внимание анализу гражданской активности и форм самоорганизации общества. Советское видение царского режима как подавителя гражданских свобод, столь активно используемое в современных западных газетах, было пересмотрено. Российская историография в настоящее время переживает интенсивные дискуссии и методологическую перестройку, поиск новых парадигм в анализе революционного процесса. Но самое главное, что историческая преемственность между имперской, советской и постсоветской эпохами постепенно восстанавливается в работах, освещающих революцию 1917 года, и постепенно оформляется идея существования единого революционного процесса с февраля по октябрь 1917 года
APA, Harvard, Vancouver, ISO, and other styles
19

Wentasari, Risa, and Rizka Novi Sesanti. "Karakteristik Iklim Mikro Dan Produksi Jagung Manis Pada Beberapa Sistem Tanam." Jurnal Penelitian Pertanian Terapan 16, no. 2 (June 19, 2017). http://dx.doi.org/10.25181/jppt.v16i2.100.

Full text
Abstract:
The purpose of this study was to determine the characteristics of the micro-climate(temperature, humidity, and light intensity) and the production of sweet corn on a sigle row,doble row, twin row, and Twin seed planting system. This study was conducted in anexperimental garden of Politeknik Negeri Lampung, Hajimena South Lampung, in July-September, 2015. This study is based on randomized block design with one factor croppingsystem consists of 4 treatment ie : Sigle Row (SR) (20cm x 75cm), Doble Row ( DR ) (20cm x20cm x 80 cm), Twin Row (TR) (20cm x 10cm x 80 cm) , and Twin Seed (TS) with plantSpacing (40cm x 75cm 2 seed in one planting hole). Parameter observations of this studyconsisted of (1) micro-climate (temperature (oC), relative humidity (RH %) and Interceptionof Light (%) ) and (2)production (corn length (cm) , corn diameter (m ) and Corn weights(grams). The data were analyzed using the F test at 1 % and 5 % level and than followed bytest BNT. The conclusion of this study were (1) The characteristics of the microclimate : a)There is a noticeable difference in the temperature of the top of the current crop of 4 mst andat 9 mst there is a significant difference in the temperature of the bottom , where SR has adifferent temperature involves the other b) All systems planting has a relative humidity (%)were not significantly different , and c ) there is a difference light interception ( % ) duringthe day when 4 mst , where the twins seed has a light interception is different from othertreatments and there is a difference light interception during 9 mst where sigle row has adifferent light interception to other treatments. (2) The production of sweet corn on thetreatment SR, DR, TR and TS were not significantly different and has a weight of corn (SR =354.8 grams, DR = 316.5 grams, 328.5 grams TR and TS = 325.4 grams) same withdescription bonanza varieties (270-300 grams).Keywords : Cropping Systems , Micro Climate , Production
APA, Harvard, Vancouver, ISO, and other styles
20

"Detection and Interception of Black Hole Attack with Justification using Anomaly based Intrusion Detection System in MANETs." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 2392–98. http://dx.doi.org/10.35940/ijrte.b1274.0982s1119.

Full text
Abstract:
Mobile adhoc network, a derivative of the adhoc network is sensitive to heterogeneous forms of attacks in particular passive and active attacks. Black hole attack is one such continually prevailing threat in mobile adhoc networks (MANETs), where specific nodes operate spitefully in the course of data transmission. Throughout this work, we intend to present an effectual approach to detect and intercept this attack taking into account Dynamic MANET on-demand (DYMO) routing protocol. This work presupposes working in three modulesplanting, detection and ultimately the interception against the black hole attack. An IDS is initiated on the notion of machine leaning using MATLAB software. A relative scrutiny of IDS grounded on classifiers like K-Nearest Neighbor, Support Vector Machine, Decision tree and neural network is also conducted to make it certain that the best feasible classifier is settled on for administering the IDS. The analysis of the put forward work is subsequently accomplished taking miscellaneous metrics covering packet drop rate, average transmission delay, Packet Delivery Ratio along with throughput.
APA, Harvard, Vancouver, ISO, and other styles
21

Mori, Makito, Hirotaka Nagai, Tsuneo Ogata, Daisuke Yasutake, and Masaharu Kitano. "Soil moisture variability on a steep slope near a ridge in a forested mountain range, Shikoku, Japan: a model study." Biologia 68, no. 6 (January 1, 2013). http://dx.doi.org/10.2478/s11756-013-0256-5.

Full text
Abstract:
AbstractVariability in soil moisture on a steep slope near a ridge in a forested mountain range, Shikoku, Japan, was studied observationally and numerically. Vertically integrated soil moisture, from a depth of −60 cm to the surface, W, was introduced as a key indicator, and its seasonal variation was analysed on a daily basis from August 2011 to August 2012. The “bucket with a bottom hole” (BBH) model of Teshima et al. (2006) was improved to consider the forest environment in simulating the variation in W. A “big-leaf” model was incorporated into the modified BBH model to estimate transpiration and interception by trees. The simulated soil moisture agreed reasonably with observed values on a daily to inter-seasonal timescale.
APA, Harvard, Vancouver, ISO, and other styles
22

Sugiyanto, Sugiyanto, and Rinci Kembang Hapsari. "Pengembangan Algoritma Advanced Encryption Standard pada Sistem Keamanan SMS Berbasis Android Menggunakan Algoritma Vigenere." Jurnal ULTIMATICS 8, no. 2 (May 31, 2017). http://dx.doi.org/10.31937/ti.v8i2.528.

Full text
Abstract:
Short Message Service (SMS) is working on a wireless network that allows the theft of the message contents. There are risks that could threaten the security of the contents of the message on SMS services, including SMS snooping, and SMS interception. Therefore, it takes security system messages on SMS services to maintain the security and integrity of the message content to cover the security messages. Algorithms Advanced Encryption Standard (AES) using a structure SPN (Substitution Permutation Network) structure, which has the disadvantage of encryption and decryption, so the safety level is low. To cover the security hole of these weaknesses, the researchers conducted the improvement of Advanced Encryption Standard (AES) algorithm security system based on android SMS using Vigenere algorithm, so that the level of security and integrity of the content of the short message becomes higher and difficult to solve. The results showed an average increase in percentage value of the avalanche effect from 37.24% to 42.96%. Keywords—Advanced Encryption Standard, android, message security, encryption.
APA, Harvard, Vancouver, ISO, and other styles
23

Hull, Mark A. "Nutritional prevention of colorectal cancer." Proceedings of the Nutrition Society, February 5, 2020, 1–6. http://dx.doi.org/10.1017/s0029665120000051.

Full text
Abstract:
The preventability estimate for colorectal cancer (CRC) is approximately 50%, highlighting the huge potential for altering modifiable lifestyle factors (including diet and body fatness) in order to reduce risk of this common malignancy. There is strong evidence that dietary factors (including intake of wholegrains, fibre, red and processed meat and alcohol) affect CRC risk. The lack of positive intervention trials and limited mechanistic understanding likely explain limited public health impact of epidemiological observations, to date. An alternative strategy for nutritional prevention of CRC is use of supplements that provide higher individual nutrient exposure than obtained through the diet (chemoprevention). There are positive data for calcium and/or vitamin D and the n-3 fatty acid EPA from polyp prevention trials using colorectal adenoma as a CRC risk biomarker. Although CRC is an obesity-related malignancy, there remains a paucity of observational data supporting intentional weight loss for CRC risk reduction. Some types of obesity surgeries (Roux-en-Y gastric bypass) might actually increase subsequent CRC risk due to alteration of local intestinal factors. There is intense interest in nutritional therapy of patients after diagnosis of CRC, in order to impact on recurrence and overall survival (now often termed cancer interception). In conclusion, nutritional prevention of CRC continues to hold much promise. Increased mechanistic understanding of the role of individual nutrients (linked to intestinal microbiota), as well as a precision medicine approach to CRC chemoprevention and interception based on both tumour and host factors, should enable translation of nutritional interventions into effective CRC risk reduction measures.
APA, Harvard, Vancouver, ISO, and other styles
24

Tutlani, Paridhi, and Mrs Priyanka. "Hiding Secret Data Using Image Steganography." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, June 20, 2019, 65–70. http://dx.doi.org/10.32628/cseit119548.

Full text
Abstract:
Today’s large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So, the attractive solution for this problem is Steganography, which is the art and science of writing hidden messages in such a way that no one, apart from the sender and intend recipient, suspects the existence of the message, a form of security through obscurity. Hiding Secret Data Using Image Steganography is the scheme of hiding the existence of secret information by concealing it into another medium such as image file. In this paper we mainly discuss different types of image steganographic methods, advantages and disadvantages. We focus in this paper on Hiding Secret Data Using Image Steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital image steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. The primary goal of steganography is to reliably send hidden information secretly, not merely to obscure its presence. Steganography in today’s computer era is considered a sub-discipline of data communication security domain. Lately, new directions based on steganographic approaches started to emerge to ensure data secrecy. Rather than as a substitute to existing solutions, these approaches could achieve better data secrecy if combined with conventional security techniques. Modern techniques of steganography exploit the characteristics of digital media by utilizing them as carriers (covers) to hold hidden information.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography